CN113128896A - Intelligent workshop management system and method based on Internet of things - Google Patents
Intelligent workshop management system and method based on Internet of things Download PDFInfo
- Publication number
- CN113128896A CN113128896A CN202110476196.1A CN202110476196A CN113128896A CN 113128896 A CN113128896 A CN 113128896A CN 202110476196 A CN202110476196 A CN 202110476196A CN 113128896 A CN113128896 A CN 113128896A
- Authority
- CN
- China
- Prior art keywords
- user
- module
- identity
- pupil
- threshold value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0631—Resource planning, allocation, distributing or scheduling for enterprises or organisations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/011—Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
- G06F3/013—Eye tracking input arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/045—Combinations of networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
- G06N3/084—Backpropagation, e.g. using gradient descent
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/04—Manufacturing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/168—Feature extraction; Face representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/18—Eye characteristics, e.g. of the iris
- G06V40/193—Preprocessing; Feature extraction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/20—Movements or behaviour, e.g. gesture recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/40—Spoof detection, e.g. liveness detection
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/30—Computing systems specially adapted for manufacturing
Abstract
The invention relates to the technical field of workshop management, in particular to an intelligent workshop management system and method based on the Internet of things. The option generating module generates options according to the daily report of the user, and the options are displayed on a screen; the identity verification module is used for acquiring the real-time motion track of the pupil of the user when the user selects an answer, and verifying the identity of the user according to the real-time motion track of the pupil of the user and the answer selected by the user; the mental state detection module is used for acquiring pupil information of the user and detecting the mental state of the user according to the pupil information of the user; the access control opening and closing control module controls the opening and closing of the access control system. The system can strengthen the identity authentication of the user who needs to enter the workshop, and detect the mental state of the user, thereby ensuring the safe operation of the workshop.
Description
Technical Field
The invention relates to the technical field of workshop management, in particular to an intelligent workshop management system and method based on the Internet of things.
Background
In the existing production, how to ensure the safe operation of a workshop, especially to prevent irrelevant personnel from entering the workshop, is a crucial point in the production process. The technical means adopted in the prior art usually prompts irrelevant personnel not to enter a workshop through marking marks, but a lot of people can break into the workshop, therefore, the prior art adopts an access control system, the identity information of people who want to enter the workshop is verified through setting passwords, face recognition and the like, the passwords are easy to leak, the face recognition system has large loopholes, the identity of the people who enter the workshop is still difficult to confirm through the control modes, and the irrelevant personnel still can easily think of the method to break into the workshop.
Especially in chemical industry type workshops, the dangerousness of articles in the workshops is high, and strict management and control are needed for personnel entering the workshops. Moreover, the personnel working in such plants need to ensure the care of the operation, otherwise a small error may cause a great risk. Therefore, for personnel entering the workshop, not only the identity of the personnel needs to be more strictly authenticated, but also the mental state of the personnel needs to be detected, so that the safe operation of the workshop is ensured.
Disclosure of Invention
The invention provides an intelligent workshop management system based on the Internet of things, which can strengthen the identity authentication of a user needing to enter a workshop and detect the mental state of the user, thereby ensuring the safe operation of the workshop.
The basic scheme provided by the invention is as follows:
the intelligent workshop management system and method based on the Internet of things comprises a daily newspaper acquisition module, a storage module, an identity recognition module, a daily newspaper acquisition module, an option generation module, an identity verification module, a mental state detection module and an access control opening and closing control module:
the daily report acquisition module: the system is used for collecting daily reports of all users in the workshop;
the storage module: the system is used for storing the identity information of each user in the workshop;
the identity recognition module: the identity recognition module is used for recognizing the identity of the user according to the identity information of each user in the storage module;
the daily newspaper acquisition module: the system comprises a data processing module, a data processing module and a data processing module, wherein the data processing module is used for acquiring a daily report of a user according to the identity of the user;
the option generation module: the system comprises a display screen, a display screen and a display screen, wherein the display screen is used for displaying a daily report of a user;
the identity verification module: the system comprises a user identification module, a user identification module and a user identification module, wherein the user identification module is used for acquiring a real-time motion track of a pupil of the user when the user selects an answer, and verifying the identity of the user according to the real-time motion track of the pupil of the user and the answer selected by the user;
the mental state detection module: the system comprises a user interface, a user interface and a user interface, wherein the user interface is used for acquiring pupil information of the user and detecting the mental state of the user according to the pupil information of the user;
entrance guard's switching control module: the access control system is used for controlling the access control system to be opened when the identity authentication module authenticates that the user is the user and the mental state of the user reaches a neutral mental state threshold value; and the identity authentication module controls the access control system to close when the user is not the user or the mental state of the user does not reach a neutral mental state threshold value.
The principle and the advantages of the invention are as follows: the daily newspaper of each user in the workshop is different due to different daily working contents and the daily newspapers of the users are different, so that the probability that irrelevant personnel know the daily newspapers of the users is low, compared with a mode of setting a password in an access control system in the prior art, the daily newspapers of the users are different in the scheme, the daily newspapers of the users are different, the user is familiar with the daily newspaper contents and the working contents and can also inquire through the daily newspaper submitting records when the daily newspapers are unclear, so that options are generated according to the daily newspapers of different users for the corresponding users to select, the safety is higher, the identity authentication of the users is more rigorous and reliable, and if the user is the user, the user cannot remember the daily newspapers of the user, and the current state of the user is not good. In addition, the scheme can acquire the real-time motion track of the pupil when the user selects the answer, so that irrelevant personnel can be prevented from impersonating workers in a workshop by using the static photo of the user. In addition, staff in the workshop, especially staff in the chemical industry class workshop need guarantee good mental state, otherwise error appears in the course of the work easily to lead to serious consequence, so this scheme detects user's mental state on the basis of strengthening the authentication to user, ensures that the user can guarantee going on safely for staff and mental state in the workshop.
Further, identity information includes the fingerprint, the identification module includes fingerprint collection module, fingerprint comparison module and identity confirmation module:
the fingerprint acquisition module: the fingerprint acquisition module is used for acquiring a fingerprint of a user;
the fingerprint comparison module: the fingerprint acquisition module is used for acquiring fingerprints of users and comparing the acquired fingerprints with fingerprints of all users in the storage module to generate a contact ratio;
the identity confirmation module: and when the contact ratio is higher than the contact ratio threshold value, the identity of the user is confirmed.
Has the advantages that: the fingerprint is everyone peculiar identification, has uniqueness and permanence, and the discernment of carrying out user's identity through the fingerprint has the security, and fingerprint identification is more convenient than the trick lock, and the touch can.
Further, the identity verification module comprises an answer judgment module, an option position generation module, a pupil tracking module, a track comparison module and a verification result generation module:
the answer judging module: for determining the accuracy of the answer selected by the user;
the option position generation module: generating the position of the option on the screen;
the pupil tracking module: the system is used for tracking the real-time motion track of the pupil when the user selects an answer;
the track comparison module: the real-time motion track of the pupil of the user is compared with the position of the option on the screen, and the staying time of the pupil of the user at the position of the option is generated;
the verification result generation module: generating a verification result that the user is the user when the answer selected by the user reaches a correct rate threshold value and the stay time reaches a time threshold value; and when the answer selected by the user does not reach the accuracy threshold value or the retention time does not reach the time threshold value, generating a verification result that the user is not the user.
Has the advantages that: the user needs to see the options when selecting the answers, the option position generating module generates the positions of the options on the screen, the pupil tracking module tracks the real-time movement track of the pupil when the user selects the answers, the track comparison module compares the real-time movement track of the pupil of the user with the positions of the options on the screen, and therefore whether the user has the option to answer or not can be judged, irrelevant personnel are prevented from impersonating staff by using dynamic images of staff in a workshop, the staff themselves are guaranteed to answer the questions, and more rigorous and reliable identity authentication of the user can be guaranteed by adopting the scheme.
Further, the identity information also includes facial features of the user when the user opens the eyes and facial features of the user when the user closes the eyes.
Has the advantages that: the identity of the user is identified through various identity information, so that the accuracy of identity identification is improved.
Further, an intelligent workshop management method based on the Internet of things is characterized in that: the method comprises the following steps:
s1: collecting daily reports of all users in a workshop;
s2: storing identity information of each user in the workshop;
s3: identifying the identity of the user according to the stored identity information of each user;
s4: acquiring a daily report of a user according to the identity of the user;
s5: generating options according to the daily report of the user, wherein the options are displayed on a screen;
s6: when the user selects an answer, acquiring a real-time motion track of the pupil of the user, and verifying the identity of the user according to the real-time motion track of the pupil of the user and the answer selected by the user;
s7: acquiring pupil information of a user, and detecting the mental state of the user according to the pupil information of the user;
s8: verifying that the user is the user himself, and controlling an access control system to be opened when the mental state of the user reaches a neutral mental state threshold value; and controlling the access control system to close when the user is not the user or the mental state of the user does not reach the neutral mental state threshold value.
Has the advantages that: the daily newspaper of each user in the workshop is different due to different daily working contents and the daily newspapers of the users are different, so that the probability that irrelevant personnel know the daily newspapers of the users is low, compared with a mode of setting a password in an access control system in the prior art, the daily newspapers of the users are different in the scheme, the daily newspapers of the users are different, the user is familiar with the daily newspaper contents and the working contents and can also inquire through the daily newspaper submitting records when the daily newspapers are unclear, so that options are generated according to the daily newspapers of different users for the corresponding users to select, the safety is higher, the identity authentication of the users is more rigorous and reliable, and if the user is the user, the user cannot remember the daily newspapers of the user, and the current state of the user is not good. In addition, the scheme can acquire the real-time motion track of the pupil when the user selects the answer, so that irrelevant personnel can be prevented from impersonating workers in a workshop by using the static photo of the user. In addition, staff in the workshop, especially staff in the chemical industry class workshop need guarantee good mental state, otherwise error appears in the course of the work easily to lead to serious consequence, so this scheme detects user's mental state on the basis of strengthening the authentication to user, ensures that the user can guarantee going on safely for staff and mental state in the workshop.
Further, the identity information includes a fingerprint, and the S3 includes:
s301: collecting a fingerprint of a user;
s302: comparing the collected user fingerprints with the stored user fingerprints respectively to generate a contact ratio;
s303: and when the contact ratio is higher than the contact ratio threshold value, confirming the identity of the user.
Has the advantages that: the fingerprint is everyone peculiar identification, has uniqueness and permanence, and the discernment of carrying out user's identity through the fingerprint has the security, and fingerprint identification is more convenient than the trick lock, and the touch can.
Further, the S6 includes:
s601: judging the accuracy of the answer selected by the user;
s602: generating the position of the option on the screen;
s603: tracking a real-time movement track of a pupil when a user selects an answer;
s604: comparing the real-time movement track of the pupil of the user with the position of the option on the screen to generate the staying time of the pupil of the user at the position of the option;
s605: generating a verification result that the user is the user when the answer selected by the user reaches a correct rate threshold value and the stay time reaches a time threshold value; and when the answer selected by the user does not reach the accuracy threshold value or the retention time does not reach the time threshold value, generating a verification result that the user is not the user.
Has the advantages that: when the user selects the answer, the user needs to see the option, the real-time motion track of the pupil of the user is compared with the position of the option on the screen, so that whether the user has the option to answer or not can be judged, irrelevant personnel are prevented from impersonating staff by using the dynamic image of the staff in a workshop, the staff can answer the question, and the scheme can ensure that the identity authentication of the user is more rigorous and reliable.
Further, the identity information also includes facial features of the user when the user opens the eyes and facial features of the user when the user closes the eyes.
Has the advantages that: the identity of the user is identified through various identity information, and the accuracy of identity identification is improved.
Drawings
Fig. 1 is a logic block diagram of an intelligent workshop management system based on the internet of things according to an embodiment of the invention.
Fig. 2 is a flowchart of an intelligent workshop management method based on the internet of things according to an embodiment of the invention.
Detailed Description
The following is further detailed by way of specific embodiments:
example 1 is substantially as shown in figure 1:
the intelligent workshop management system based on the Internet of things comprises a daily newspaper acquisition module, a storage module, an identity recognition module, a daily newspaper acquisition module, an option generation module, an identity verification module, a mental state detection module and an access control opening and closing control module. The daily newspaper acquisition module is used for acquiring daily newspapers of all users in a workshop; the storage module is used for storing identity information of each user in the workshop, in this embodiment, the identity information is a fingerprint, and in other embodiments of the present application, the identity information may also be facial features of the user when the user opens his eyes and facial features of the user when the user closes his eyes.
The identity recognition module is used for recognizing the identity of the user according to the identity information of each user in the storage module. The identity identification module comprises a fingerprint acquisition module, a fingerprint comparison module and an identity confirmation module. The fingerprint acquisition module is used for acquiring fingerprints of users; the fingerprint comparison module compares the acquired fingerprints of the users with the fingerprints of all the users in the storage module respectively to generate a contact ratio; the identity confirmation module is used for confirming the identity of the user when the contact ratio is higher than the contact ratio threshold value. In this embodiment, the contact ratio is 0% to 100%, and the contact ratio threshold is 90%.
The daily newspaper acquisition module acquires the daily newspaper of the user according to the identity of the user identified by the identity identification module. In this embodiment, the daily report of the user on the last working day is obtained. The option generation module generates options according to the daily report of the last working day of the user, the options are displayed on a screen, and the content of the daily report comprises working content, a working plan and a working summary.
In this embodiment, the option generation module generates three topics, which are the topics of the work content, the work plan, and the work summary in the daily report of the last working day of the user. The specific generation mode is as follows: one keyword in the work plan is extracted, three keywords are randomly generated and are respectively used as four options of a choice question for a user to select the work plan of the previous working day, and the user can be reminded of work required today while the user identity is confirmed. The manner of generating the topics related to the work content and the work summary is the same as the manner of generating the topics related to the work plan, and is not described herein again.
The identity verification module is used for acquiring the real-time motion track of the pupil of the user when the user selects the answer, and verifying the identity of the user according to the real-time motion track of the pupil of the user and the answer selected by the user. The identity verification module comprises an answer judgment module, an option position generation module, a pupil tracking module, a track comparison module and a verification result generation module.
The answer judging module is used for judging the accuracy of the answer selected by the user; the option position generating module is used for generating positions of options on a screen, in the embodiment, the options occupy one fourth of the area of the screen, and the positions of the options on the screen are an upper left corner, a lower left corner, an upper right corner and a lower right corner respectively; the pupil tracking module is used for tracking the real-time motion track of the pupil when the user selects an answer; the track comparison module is used for comparing the real-time motion track of the pupil of the user with the position of the option on the screen to generate the staying time of the pupil of the user at the position of the option; the verification result generation module is used for generating a verification result of the user as the user when the answer selected by the user reaches a correct rate threshold value and the retention time reaches a time threshold value; and when the answer selected by the user does not reach the accuracy threshold value or the retention time does not reach the time threshold value, generating a verification result that the user is not the user. In this embodiment, the accuracy threshold 2/3 is a time threshold of 5 seconds.
The mental state detection module is used for acquiring pupil information of the user and detecting the mental state of the user according to the pupil information of the user. In this embodiment, the pupil information is the area of the eyelid covering the pupil and the blinking frequency, the mental state detection module uses the area of the eyelid covering the pupil and the blinking frequency of the user as the input of the input layer and uses the mental state of the user as the output of the output layer in an artificial intelligence manner.
Specifically, a three-layer BP neural network model is constructed firstly, and comprises an input layer, a hidden layer and an output layer, in the embodiment, the input layer has 2 nodes, the output of the output layer has 1 node, in the embodiment, the output mental states of a user include 0-10 from bad to good, and the neutral mental state threshold of the user is 6; for hidden layers, the present embodiment uses the following formula to determine the number of hidden layer nodes:where l is the number of nodes of the hidden layer, n is the number of nodes of the input layer, m is the number of nodes of the output layer, and a is a number between 1 and 10, which is taken as 6 in this embodiment, so that the hidden layer has 8 nodes in total. BP neural networks typically employ Sigmoid differentiable functions and linear functions as the excitation function of the network. This example selects the S-type tangent function tansig as the excitation function for hidden layer neurons. The prediction model selects an S-shaped logarithmic function tansig as an excitation function of neurons of an output layer.
The access control system comprises an access control opening and closing control module, an authentication module and a control module, wherein the access control opening and closing control module is used for controlling the access control system to open when the user is authenticated as the user by the authentication module and the mental state of the user reaches a neutral mental state threshold value; and the identity authentication module controls the access control system to close when the user is not the user or the mental state of the user does not reach a neutral mental state threshold value.
Example 2 is substantially as shown in figure 2:
an intelligent workshop management method based on the Internet of things comprises the following steps:
s1: collecting daily reports of all users in a workshop;
s2: storing identity information of each user in the workshop; in this embodiment, the identity information is a fingerprint, and in other embodiments of the present application, the identity information may also be a facial feature when the user opens the eyes and a facial feature when the user closes the eyes.
S3: identifying the identity of the user according to the stored identity information of each user;
s4: acquiring a daily report of a user according to the identity of the user;
s5: generating options according to the daily report of the user, wherein the options are displayed on a screen;
s6: when the user selects an answer, acquiring a real-time motion track of the pupil of the user, and verifying the identity of the user according to the real-time motion track of the pupil of the user and the answer selected by the user;
s7: acquiring pupil information of a user, and detecting the mental state of the user according to the pupil information of the user; in this embodiment, the pupil information is the area of the eyelid covering the pupil and the blinking frequency;
s8: verifying that the user is the user himself, and controlling an access control system to be opened when the mental state of the user reaches a neutral mental state threshold value; and controlling the access control system to close when the user is not the user or the mental state of the user does not reach the neutral mental state threshold value.
Wherein S3 includes S301: collecting a fingerprint of a user;
s302: comparing the collected user fingerprints with the stored user fingerprints respectively to generate a contact ratio; in this embodiment, the degree of overlap comprises 0% to 100%;
s303: when the contact ratio is higher than the contact ratio threshold value, the identity of the user is confirmed; in this embodiment, the threshold value of the contact ratio is 90%.
Specifically, S4 obtains the daily report of the user according to the identified identity of the user. In this embodiment, the daily newspaper of the last working day of the user is acquired, and options are generated according to the daily newspaper of the last working day of the user, where the options are displayed on a screen, and the content of the daily newspaper includes work content, a work plan, and a work summary.
In this embodiment, three topics are formed together, and are topics related to work content, work plan, and work summary in the daily report of the last working day of the user. The specific generation mode is as follows: one keyword in the work plan is extracted, three keywords are randomly generated and are respectively used as four options of a choice question for a user to select the work plan of the previous working day, and the user can be reminded of work required today while the user identity is confirmed. The manner of generating the topics related to the work content and the work summary is the same as the manner of generating the topics related to the work plan, and is not described herein again.
Wherein S6 includes:
s601: judging the accuracy of the answer selected by the user;
s602: generating the position of the option on the screen; in this embodiment, the options occupy one fourth of the area of the screen, and the positions of the options on the screen are the upper left corner, the lower left corner, the upper right corner and the lower right corner respectively;
s603: tracking a real-time movement track of a pupil when a user selects an answer;
s604: comparing the real-time movement track of the pupil of the user with the position of the option on the screen to generate the staying time of the pupil of the user at the position of the option;
s605: generating a verification result that the user is the user when the answer selected by the user reaches a correct rate threshold value and the stay time reaches a time threshold value; and when the answer selected by the user does not reach the accuracy threshold value or the retention time does not reach the time threshold value, generating a verification result that the user is not the user. In this embodiment, the accuracy threshold 2/3 is a time threshold of 5 seconds.
In this embodiment, in S7, the area of the user' S eyelid covering the pupil and the blinking frequency are used as the input of the input layer, and the mental state of the user is used as the output of the output layer. Specifically, a three-layer BP neural network model is constructed firstly, and comprises an input layer, a hidden layer and an output layer, in the embodiment, the input layer has 2 nodes, the output of the output layer has 1 node, in the embodiment, the output mental states of a user include 0-10 from bad to good, and the neutral mental state threshold of the user is 6; for hidden layers, the present embodiment uses the following formula to determine the number of hidden layer nodes:wherein l is the number of nodes of the hidden layer, n is the number of nodes of the input layer, m is the number of nodes of the output layer, a is 1 to 10The number in between is 6 in this embodiment, so the hidden layer has 8 nodes. BP neural networks typically employ Sigmoid differentiable functions and linear functions as the excitation function of the network. This example selects the S-type tangent function tansig as the excitation function for hidden layer neurons. The prediction model selects an S-shaped logarithmic function tansig as an excitation function of neurons of an output layer.
The foregoing are merely exemplary embodiments of the present invention, and no attempt is made to show structural details of the invention in more detail than is necessary for the fundamental understanding of the art, the description taken with the drawings making apparent to those skilled in the art how the several forms of the invention may be embodied in practice with the teachings of the invention. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.
Claims (8)
1. Wisdom workshop management system based on thing networking, its characterized in that: the system comprises a daily newspaper acquisition module, a storage module, an identity recognition module, a daily newspaper acquisition module, an option generation module, an identity verification module, a mental state detection module and an access control opening and closing control module:
the daily report acquisition module: the system is used for collecting daily reports of all users in the workshop;
the storage module: the system is used for storing the identity information of each user in the workshop;
the identity recognition module: the identity recognition module is used for recognizing the identity of the user according to the identity information of each user in the storage module;
the daily newspaper acquisition module: the system comprises a data processing module, a data processing module and a data processing module, wherein the data processing module is used for acquiring a daily report of a user according to the identity of the user;
the option generation module: the system comprises a display screen, a display screen and a display screen, wherein the display screen is used for displaying a daily report of a user;
the identity verification module: the system comprises a user identification module, a user identification module and a user identification module, wherein the user identification module is used for acquiring a real-time motion track of a pupil of the user when the user selects an answer, and verifying the identity of the user according to the real-time motion track of the pupil of the user and the answer selected by the user;
the mental state detection module: the system comprises a user interface, a user interface and a user interface, wherein the user interface is used for acquiring pupil information of the user and detecting the mental state of the user according to the pupil information of the user;
entrance guard's switching control module: the access control system is used for controlling the access control system to be opened when the identity authentication module authenticates that the user is the user and the mental state of the user reaches a neutral mental state threshold value; and the identity authentication module controls the access control system to close when the user is not the user or the mental state of the user does not reach a neutral mental state threshold value.
2. The intelligent workshop management system based on the internet of things of claim 1, wherein: the identity information comprises a fingerprint, and the identity identification module comprises a fingerprint acquisition module, a fingerprint comparison module and an identity confirmation module:
the fingerprint acquisition module: the fingerprint acquisition module is used for acquiring a fingerprint of a user;
the fingerprint comparison module: the fingerprint acquisition module is used for acquiring fingerprints of users and comparing the acquired fingerprints with fingerprints of all users in the storage module to generate a contact ratio;
the identity confirmation module: and when the contact ratio is higher than the contact ratio threshold value, the identity of the user is confirmed.
3. The intelligent workshop management system based on the internet of things of claim 1, wherein: the identity verification module comprises an answer judgment module, an option position generation module, a pupil tracking module, a track comparison module and a verification result generation module:
the answer judging module: for determining the accuracy of the answer selected by the user;
the option position generation module: generating the position of the option on the screen;
the pupil tracking module: the system is used for tracking the real-time motion track of the pupil when the user selects an answer;
the track comparison module: the real-time motion track of the pupil of the user is compared with the position of the option on the screen, and the staying time of the pupil of the user at the position of the option is generated;
the verification result generation module: generating a verification result that the user is the user when the answer selected by the user reaches a correct rate threshold value and the stay time reaches a time threshold value; and when the answer selected by the user does not reach the accuracy threshold value or the retention time does not reach the time threshold value, generating a verification result that the user is not the user.
4. The intelligent workshop management system based on the internet of things of claim 1, wherein: the identity information also includes facial features of the user when the user is open and facial features of the user when the user is closed.
5. An intelligent workshop management method based on the Internet of things is characterized by comprising the following steps: the method comprises the following steps:
s1: collecting daily reports of all users in a workshop;
s2: storing identity information of each user in the workshop;
s3: identifying the identity of the user according to the stored identity information of each user;
s4: acquiring a daily report of a user according to the identity of the user;
s5: generating options according to the daily report of the user, wherein the options are displayed on a screen;
s6: when the user selects an answer, acquiring a real-time motion track of the pupil of the user, and verifying the identity of the user according to the real-time motion track of the pupil of the user and the answer selected by the user;
s7: acquiring pupil information of a user, and detecting the mental state of the user according to the pupil information of the user;
s8: verifying that the user is the user himself, and controlling an access control system to be opened when the mental state of the user reaches a neutral mental state threshold value; and controlling the access control system to close when the user is not the user or the mental state of the user does not reach the neutral mental state threshold value.
6. The intelligent workshop management method based on the internet of things of claim 5, wherein the intelligent workshop management method comprises the following steps: the identity information includes a fingerprint, and the S3 includes:
s301: collecting a fingerprint of a user;
s302: comparing the collected user fingerprints with the stored user fingerprints respectively to generate a contact ratio;
s303: and when the contact ratio is higher than the contact ratio threshold value, confirming the identity of the user.
7. The intelligent workshop management method based on the internet of things of claim 5, wherein the intelligent workshop management method comprises the following steps: the S6 includes:
s601: judging the accuracy of the answer selected by the user;
s602: generating the position of the option on the screen;
s603: tracking a real-time movement track of a pupil when a user selects an answer;
s604: comparing the real-time movement track of the pupil of the user with the position of the option on the screen to generate the staying time of the pupil of the user at the position of the option;
s605: generating a verification result that the user is the user when the answer selected by the user reaches a correct rate threshold value and the stay time reaches a time threshold value; and when the answer selected by the user does not reach the accuracy threshold value or the retention time does not reach the time threshold value, generating a verification result that the user is not the user.
8. The intelligent workshop management method based on the internet of things of claim 5, wherein the intelligent workshop management method comprises the following steps: the identity information also includes facial features of the user when the user is open and facial features of the user when the user is closed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110476196.1A CN113128896B (en) | 2021-04-29 | 2021-04-29 | Intelligent workshop management system and method based on Internet of things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110476196.1A CN113128896B (en) | 2021-04-29 | 2021-04-29 | Intelligent workshop management system and method based on Internet of things |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113128896A true CN113128896A (en) | 2021-07-16 |
CN113128896B CN113128896B (en) | 2023-07-18 |
Family
ID=76781579
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110476196.1A Active CN113128896B (en) | 2021-04-29 | 2021-04-29 | Intelligent workshop management system and method based on Internet of things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113128896B (en) |
Citations (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020097145A1 (en) * | 1997-11-06 | 2002-07-25 | David M. Tumey | Integrated vehicle security system utilizing facial image verification |
WO2004010365A2 (en) * | 2002-07-19 | 2004-01-29 | Dicut Inc. | Face recognition system and method therefor |
US20080104415A1 (en) * | 2004-12-06 | 2008-05-01 | Daphna Palti-Wasserman | Multivariate Dynamic Biometrics System |
WO2008157342A1 (en) * | 2007-06-13 | 2008-12-24 | Videntity Systems, Inc. | Identity verification and information management |
WO2009043047A1 (en) * | 2007-09-28 | 2009-04-02 | Eye Controls, Llc | Systems and methods for biometric identification |
CN102279422A (en) * | 2010-06-11 | 2011-12-14 | 秦和平 | Detection method based on intelligent anti-terrorism safety inspection door device |
US20130189661A1 (en) * | 2010-06-07 | 2013-07-25 | Affectiva, Inc. | Scoring humor reactions to digital media |
CN103902046A (en) * | 2014-04-10 | 2014-07-02 | 深圳市中兴移动通信有限公司 | Intelligent prompting method and terminal |
JP2014211766A (en) * | 2013-04-18 | 2014-11-13 | 三菱化学エンジニアリング株式会社 | Personnel management system and personnel management method |
CN106562793A (en) * | 2015-10-08 | 2017-04-19 | 松下电器(美国)知识产权公司 | Method for controlling information display apparatus, and information display apparatus |
US20170161976A1 (en) * | 2015-12-07 | 2017-06-08 | Utechzone Co., Ltd. | Identity verification method, apparatus and system and non-transitory computer readable medium thereof |
CN107393096A (en) * | 2017-08-11 | 2017-11-24 | 阜阳华润电力有限公司 | The control method and access control device of a kind of gate inhibition |
CN107464325A (en) * | 2017-09-13 | 2017-12-12 | 南京信息职业技术学院 | A kind of multi-layer gate control system and its implementation |
JP2018106435A (en) * | 2016-12-27 | 2018-07-05 | 清水建設株式会社 | Labor Management System |
WO2018151758A1 (en) * | 2017-02-17 | 2018-08-23 | Whatsapp Inc. | Methods and systems for processing an ephemeral content message |
CN108830975A (en) * | 2018-04-27 | 2018-11-16 | 安徽继远软件有限公司 | A kind of Intelligent human-face identification gate control system and control method |
US20180336286A1 (en) * | 2014-04-14 | 2018-11-22 | Netspective Communications Llc | Multi-source user generated electronic data integration in a blockchain-based transactional system |
CN109272627A (en) * | 2018-11-01 | 2019-01-25 | 云南昆钢电子信息科技有限公司 | A kind of mine down-hole gate inhibition automatic control device |
CN208444022U (en) * | 2018-07-25 | 2019-01-29 | 中控智慧科技股份有限公司 | Station is stared in a kind of safety check |
CN110197108A (en) * | 2018-08-17 | 2019-09-03 | 平安科技(深圳)有限公司 | Auth method, device, computer equipment and storage medium |
CN110390741A (en) * | 2018-04-23 | 2019-10-29 | 宁波欧依安盾安全科技有限公司 | A kind of intelligent access control system |
CN110827457A (en) * | 2018-07-23 | 2020-02-21 | 宁波欧依安盾安全科技有限公司 | Virtual access control system based on safety competence identification |
CN111832344A (en) * | 2019-04-17 | 2020-10-27 | 深圳熙卓科技有限公司 | Dynamic pupil detection method and device |
CN112507315A (en) * | 2021-02-05 | 2021-03-16 | 红石阳光(北京)科技股份有限公司 | Personnel passing detection system based on intelligent brain |
US20210287155A1 (en) * | 2017-02-28 | 2021-09-16 | Omron Corporation | Production management apparatus, method, and program |
-
2021
- 2021-04-29 CN CN202110476196.1A patent/CN113128896B/en active Active
Patent Citations (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020097145A1 (en) * | 1997-11-06 | 2002-07-25 | David M. Tumey | Integrated vehicle security system utilizing facial image verification |
WO2004010365A2 (en) * | 2002-07-19 | 2004-01-29 | Dicut Inc. | Face recognition system and method therefor |
US20080104415A1 (en) * | 2004-12-06 | 2008-05-01 | Daphna Palti-Wasserman | Multivariate Dynamic Biometrics System |
WO2008157342A1 (en) * | 2007-06-13 | 2008-12-24 | Videntity Systems, Inc. | Identity verification and information management |
WO2009043047A1 (en) * | 2007-09-28 | 2009-04-02 | Eye Controls, Llc | Systems and methods for biometric identification |
US20130189661A1 (en) * | 2010-06-07 | 2013-07-25 | Affectiva, Inc. | Scoring humor reactions to digital media |
CN102279422A (en) * | 2010-06-11 | 2011-12-14 | 秦和平 | Detection method based on intelligent anti-terrorism safety inspection door device |
JP2014211766A (en) * | 2013-04-18 | 2014-11-13 | 三菱化学エンジニアリング株式会社 | Personnel management system and personnel management method |
CN103902046A (en) * | 2014-04-10 | 2014-07-02 | 深圳市中兴移动通信有限公司 | Intelligent prompting method and terminal |
US20180336286A1 (en) * | 2014-04-14 | 2018-11-22 | Netspective Communications Llc | Multi-source user generated electronic data integration in a blockchain-based transactional system |
CN106562793A (en) * | 2015-10-08 | 2017-04-19 | 松下电器(美国)知识产权公司 | Method for controlling information display apparatus, and information display apparatus |
US20170161976A1 (en) * | 2015-12-07 | 2017-06-08 | Utechzone Co., Ltd. | Identity verification method, apparatus and system and non-transitory computer readable medium thereof |
JP2018106435A (en) * | 2016-12-27 | 2018-07-05 | 清水建設株式会社 | Labor Management System |
WO2018151758A1 (en) * | 2017-02-17 | 2018-08-23 | Whatsapp Inc. | Methods and systems for processing an ephemeral content message |
US20210287155A1 (en) * | 2017-02-28 | 2021-09-16 | Omron Corporation | Production management apparatus, method, and program |
CN107393096A (en) * | 2017-08-11 | 2017-11-24 | 阜阳华润电力有限公司 | The control method and access control device of a kind of gate inhibition |
CN107464325A (en) * | 2017-09-13 | 2017-12-12 | 南京信息职业技术学院 | A kind of multi-layer gate control system and its implementation |
CN110390741A (en) * | 2018-04-23 | 2019-10-29 | 宁波欧依安盾安全科技有限公司 | A kind of intelligent access control system |
CN108830975A (en) * | 2018-04-27 | 2018-11-16 | 安徽继远软件有限公司 | A kind of Intelligent human-face identification gate control system and control method |
CN110827457A (en) * | 2018-07-23 | 2020-02-21 | 宁波欧依安盾安全科技有限公司 | Virtual access control system based on safety competence identification |
CN208444022U (en) * | 2018-07-25 | 2019-01-29 | 中控智慧科技股份有限公司 | Station is stared in a kind of safety check |
CN110197108A (en) * | 2018-08-17 | 2019-09-03 | 平安科技(深圳)有限公司 | Auth method, device, computer equipment and storage medium |
CN109272627A (en) * | 2018-11-01 | 2019-01-25 | 云南昆钢电子信息科技有限公司 | A kind of mine down-hole gate inhibition automatic control device |
CN111832344A (en) * | 2019-04-17 | 2020-10-27 | 深圳熙卓科技有限公司 | Dynamic pupil detection method and device |
CN112507315A (en) * | 2021-02-05 | 2021-03-16 | 红石阳光(北京)科技股份有限公司 | Personnel passing detection system based on intelligent brain |
Non-Patent Citations (1)
Title |
---|
于兴尚;高晶;: "人工智能视域下图书馆智慧服务探析", 图书馆研究 * |
Also Published As
Publication number | Publication date |
---|---|
CN113128896B (en) | 2023-07-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jain et al. | An introduction to biometric recognition | |
US9396319B2 (en) | Method of criminal profiling and person identification using cognitive/behavioral biometric fingerprint analysis | |
CN103634118B (en) | Existence authentication method based on card and compound bio feature identification | |
Ghizlane et al. | A new model of automatic and continuous online exam monitoring | |
CN111540105B (en) | Method, system, equipment and storage medium for controlling access control | |
Das | Biometric technology: authentication, biocryptography, and cloud-based architecture | |
Amaro et al. | Evaluation of machine learning techniques for face detection and recognition | |
Sivaram et al. | Biometric security and performance metrics: FAR, FER, CER, FRR | |
Lai et al. | Bridging the gap between forensics and biometric-enabled watchlists for e-borders | |
JP3590285B2 (en) | Biological information recognition device and method | |
CN113128896B (en) | Intelligent workshop management system and method based on Internet of things | |
Dhir et al. | Biometric recognition: A modern era for security | |
Akhdan et al. | Face recognition with anti spoofing eye blink detection | |
Rosy et al. | An enhanced intelligent attendance management system for smart campus | |
US11238554B2 (en) | Frictionless security monitoring and management | |
Bhandwalkar et al. | Continuous user authentication using soft biometric traits for E-learning | |
Takeda et al. | Biometric personal authentication by one step foot pressure distribution change by fuzzy artificial immune system | |
Bobde et al. | Face recognition technology | |
KR101250633B1 (en) | Image based CAPTCHA method and recording medium for program | |
Raghu et al. | Neural network based authentication and verification for web based key stroke dynamics | |
Martovytskyi et al. | Mathematical Model of User Behavior in Computer Systems | |
Ode-Martins | Challenges of Biometrics Technology in Nigeria to Enhance Information Security: A Qualitative Exploratory Case Study | |
Saidaminkhodja | EFFECTIVE METHODS AND ALGORITHMS FOR FACE RECOGNITION BASED ON DEEP LEARNING TECHNOLOGY | |
Kaluža et al. | A probabilistic risk analysis for multimodal entry control | |
Kadam et al. | Contactless Attendance System based on Face Recognition using OpenCv |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |